Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sven LaurAssociate Professor in Privacy-Preserving Data Mining, University of TartuEmail verificata su ut.ee
- Liina KammSenior researcher at Cybernetica ASEmail verificata su cyber.ee
- Jan WillemsonSenior researcher, CyberneticaEmail verificata su cyber.ee
- Riivo Talvisteresearcher, Cybernetica ASEmail verificata su cyber.ee
- Pille Pullonen-RaudvereCyberneticaEmail verificata su cyber.ee
- Peeter LaudCybernetica ASEmail verificata su cyber.ee
- Margus NiitsooUniversity of TartuEmail verificata su ut.ee
- Tomas ToftPostDoc, Computer Science Dept., Aarhus UniversityEmail verificata su cs.au.dk
- Yehuda LindellCryptographer at Coinbase; Professor of Computer Science, Bar-Ilan University (on leaveEmail verificata su biu.ac.il
- Marko JõemetsProject Manager, Cybernetica ASEmail verificata su cyber.ee
- Reimo RebaneCybernetica ASEmail verificata su cyber.ee
- Pille Pruulmann-VengerfeldtProfessor in media and communication, Malmö UniversityEmail verificata su mau.se
- Nigel SmartKU LeuvenEmail verificata su kuleuven.be
- Rebecca N. WrightBarnard CollegeEmail verificata su barnard.edu
- Jaak ViloProf. of Bioinformatics, Institute of Computer Science, University of Tartu, EstoniaEmail verificata su ut.ee
- Benny PinkasBar Ilan University and Aptos LabsEmail verificata su biu.ac.il
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtEmail verificata su encrypto.cs.tu-darmstadt.de
- Shin'ichiro MatsuoResearch Professor of Computer Science, Georgetown UniversityEmail verificata su georgetown.edu